Guest User

m_crash.dump

a guest
Jan 12th, 2016
56
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.69 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 10 Kernel Version 10586 MP (8 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  17. Built by: 10586.17.amd64fre.th2_release.151121-2308
  18. Machine Name:
  19. Kernel base = 0xfffff801`0cc15000 PsLoadedModuleList = 0xfffff801`0cef3c70
  20. Debug session time: Mon Jan 11 19:34:05.854 2016 (UTC - 5:00)
  21. System Uptime: 3 days 0:21:38.723
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. .......................................................
  26. Loading User Symbols
  27. PEB is paged out (Peb.Ldr = 000000e2`80068018). Type ".hh dbgerr001" for details
  28. Loading unloaded module list
  29. .................................
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. Use !analyze -v to get detailed debugging information.
  37.  
  38. BugCheck 139, {3, ffffd00021787390, ffffd000217872e8, 0}
  39.  
  40. Page 1100 not present in the dump file. Type ".hh dbgerr004" for details
  41. Page 1100 not present in the dump file. Type ".hh dbgerr004" for details
  42. Page 1100 not present in the dump file. Type ".hh dbgerr004" for details
  43. Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGDEVICE::DestroyAllDeviceState+1cb )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 7: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. KERNEL_SECURITY_CHECK_FAILURE (139)
  56. A kernel component has corrupted a critical data structure. The corruption
  57. could potentially allow a malicious user to gain control of this machine.
  58. Arguments:
  59. Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
  60. Arg2: ffffd00021787390, Address of the trap frame for the exception that caused the bugcheck
  61. Arg3: ffffd000217872e8, Address of the exception record for the exception that caused the bugcheck
  62. Arg4: 0000000000000000, Reserved
  63.  
  64. Debugging Details:
  65. ------------------
  66.  
  67. Page 1100 not present in the dump file. Type ".hh dbgerr004" for details
  68.  
  69. DUMP_CLASS: 1
  70.  
  71. DUMP_QUALIFIER: 401
  72.  
  73. BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308
  74.  
  75. SYSTEM_MANUFACTURER: Dell Inc.
  76.  
  77. SYSTEM_PRODUCT_NAME: Inspiron 7559
  78.  
  79. SYSTEM_SKU: 0706
  80.  
  81. SYSTEM_VERSION: 1.1.3
  82.  
  83. BIOS_VENDOR: Dell Inc.
  84.  
  85. BIOS_VERSION: 1.1.3
  86.  
  87. BIOS_DATE: 11/05/2015
  88.  
  89. BASEBOARD_MANUFACTURER: Dell Inc.
  90.  
  91. BASEBOARD_PRODUCT: 0H0CC0
  92.  
  93. BASEBOARD_VERSION: A00
  94.  
  95. DUMP_TYPE: 1
  96.  
  97. BUGCHECK_P1: 3
  98.  
  99. BUGCHECK_P2: ffffd00021787390
  100.  
  101. BUGCHECK_P3: ffffd000217872e8
  102.  
  103. BUGCHECK_P4: 0
  104.  
  105. TRAP_FRAME: ffffd00021787390 -- (.trap 0xffffd00021787390)
  106. NOTE: The trap frame does not contain all registers.
  107. Some register values may be zeroed or incorrect.
  108. rax=ffffe000390b5260 rbx=0000000000000000 rcx=0000000000000003
  109. rdx=ffffe000390b53c0 rsi=0000000000000000 rdi=0000000000000000
  110. rip=fffff8010cd6ed82 rsp=ffffd00021787520 rbp=ffffd00021787629
  111. r8=ffffc0019d22a170 r9=0000000000000003 r10=7fffc0019d22a170
  112. r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
  113. r14=0000000000000000 r15=0000000000000000
  114. iopl=0 nv up ei ng nz na pe cy
  115. nt! ?? ::FNODOBFM::`string'+0x8c82:
  116. fffff801`0cd6ed82 cd29 int 29h
  117. Resetting default scope
  118.  
  119. EXCEPTION_RECORD: ffffd000217872e8 -- (.exr 0xffffd000217872e8)
  120. ExceptionAddress: fffff8010cd6ed82 (nt! ?? ::FNODOBFM::`string'+0x0000000000008c82)
  121. ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  122. ExceptionFlags: 00000001
  123. NumberParameters: 1
  124. Parameter[0]: 0000000000000003
  125. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
  126.  
  127. CPU_COUNT: 8
  128.  
  129. CPU_MHZ: a20
  130.  
  131. CPU_VENDOR: GenuineIntel
  132.  
  133. CPU_FAMILY: 6
  134.  
  135. CPU_MODEL: 5e
  136.  
  137. CPU_STEPPING: 3
  138.  
  139. CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 49'00000000 (cache) 49'00000000 (init)
  140.  
  141. DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
  142.  
  143. BUGCHECK_STR: 0x139
  144.  
  145. PROCESS_NAME: Gfxv4_0.exe
  146.  
  147. CURRENT_IRQL: 2
  148.  
  149. ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  150.  
  151. EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
  152.  
  153. EXCEPTION_CODE_STR: c0000409
  154.  
  155. EXCEPTION_PARAMETER1: 0000000000000003
  156.  
  157. ANALYSIS_SESSION_HOST: SKYFORGE
  158.  
  159. ANALYSIS_SESSION_TIME: 01-12-2016 11:04:33.0238
  160.  
  161. ANALYSIS_VERSION: 10.0.10586.567 amd64fre
  162.  
  163. LAST_CONTROL_TRANSFER: from fffff8010cd622e9 to fffff8010cd57760
  164.  
  165. STACK_TEXT:
  166. ffffd000`21787068 fffff801`0cd622e9 : 00000000`00000139 00000000`00000003 ffffd000`21787390 ffffd000`217872e8 : nt!KeBugCheckEx
  167. ffffd000`21787070 fffff801`0cd62610 : 00000000`00000048 00000000`00000000 ffffe000`2b753a50 fffff801`0ce452a1 : nt!KiBugCheckDispatch+0x69
  168. ffffd000`217871b0 fffff801`0cd617f3 : ffffe000`3408a010 ffffe000`3408a010 00000000`00000000 ffffe000`37c92e10 : nt!KiFastFailDispatch+0xd0
  169. ffffd000`21787390 fffff801`0cd6ed82 : ffffc001`9d22a0b0 ffffc001`9d22a170 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf3
  170. ffffd000`21787520 fffff800`4f67147b : ffffc001`00000000 ffffc001`818bf4c0 ffffc001`818bf500 ffffc001`818bf500 : nt! ?? ::FNODOBFM::`string'+0x8c82
  171. ffffd000`21787550 fffff800`4f670653 : ffffc001`818bf4c0 00000000`00000000 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x1cb
  172. ffffd000`21787590 fffff800`4f653717 : ffffc001`818bf4c0 ffffc001`9d22a0b0 ffffc001`9d22a0b0 ffffe000`38e91480 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xa7
  173. ffffd000`217875c0 fffff800`4f6500b4 : 00000000`00000100 ffffc001`9d22a0b0 ffffc001`9d22a0b0 fffff960`35892d90 : dxgkrnl!DXGPROCESS::Destroy+0x2bf
  174. ffffd000`21787690 fffff960`357b6c9c : 00000000`0000020c fffff901`44892010 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkProcessCallout+0x64
  175. ffffd000`217876f0 fffff960`35435cb9 : fffff901`44892010 fffff901`44892010 ffffe000`35f2c3c0 00000000`00000001 : win32kbase!GdiProcessCallout+0x8c
  176. ffffd000`21787770 fffff960`357d08cb : ffffd000`21787948 ffffd000`217878c0 00000000`00000000 00000000`00000000 : win32kfull!W32pProcessCallout+0xd9
  177. ffffd000`217877a0 fffff801`0d011262 : ffffd000`217878c0 ffffe000`362a48a0 00000000`00000000 00000000`00000000 : win32kbase!W32CalloutDispatch+0x6b
  178. ffffd000`21787810 fffff801`0d01bddf : ffffe000`362a48a0 00000000`00000000 00000000`00000000 ffffe000`35f2c3c0 : nt!PsInvokeWin32Callout+0x42
  179. ffffd000`21787850 fffff801`0d0962f2 : ffffe000`00000000 ffffe000`38e91480 ffffe000`38e91480 ffffe000`35f2c3c0 : nt!PspExitThread+0x49b
  180. ffffd000`21787990 fffff801`0cd61fa3 : ffffe000`38e91480 ffffe000`35f2c3c0 ffffd000`21787a80 ffffd000`21787a80 : nt!NtTerminateProcess+0xde
  181. ffffd000`21787a00 00007fff`dd955364 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  182. 000000e2`805ff048 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`dd955364
  183.  
  184.  
  185. STACK_COMMAND: kb
  186.  
  187. THREAD_SHA1_HASH_MOD_FUNC: a0a5514a4d87706527c6f92c37842ea8c43b81ac
  188.  
  189. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 11718e5c925d2d833f63315284a04f89616e7880
  190.  
  191. THREAD_SHA1_HASH_MOD: c9f3f8c71ac99eb021b386cc891dde1c61018273
  192.  
  193. FOLLOWUP_IP:
  194. dxgkrnl!DXGDEVICE::DestroyAllDeviceState+1cb
  195. fffff800`4f67147b 488b4b50 mov rcx,qword ptr [rbx+50h]
  196.  
  197. FAULT_INSTR_CODE: 504b8b48
  198.  
  199. SYMBOL_STACK_INDEX: 5
  200.  
  201. SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyAllDeviceState+1cb
  202.  
  203. FOLLOWUP_NAME: MachineOwner
  204.  
  205. MODULE_NAME: dxgkrnl
  206.  
  207. IMAGE_NAME: dxgkrnl.sys
  208.  
  209. DEBUG_FLR_IMAGE_TIMESTAMP: 5632d261
  210.  
  211. BUCKET_ID_FUNC_OFFSET: 1cb
  212.  
  213. FAILURE_BUCKET_ID: 0x139_3_dxgkrnl!DXGDEVICE::DestroyAllDeviceState
  214.  
  215. BUCKET_ID: 0x139_3_dxgkrnl!DXGDEVICE::DestroyAllDeviceState
  216.  
  217. PRIMARY_PROBLEM_CLASS: 0x139_3_dxgkrnl!DXGDEVICE::DestroyAllDeviceState
  218.  
  219. TARGET_TIME: 2016-01-12T00:34:05.000Z
  220.  
  221. OSBUILD: 10586
  222.  
  223. OSSERVICEPACK: 0
  224.  
  225. SERVICEPACK_NUMBER: 0
  226.  
  227. OS_REVISION: 0
  228.  
  229. SUITE_MASK: 784
  230.  
  231. PRODUCT_TYPE: 1
  232.  
  233. OSPLATFORM_TYPE: x64
  234.  
  235. OSNAME: Windows 10
  236.  
  237. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  238.  
  239. OS_LOCALE:
  240.  
  241. USER_LCID: 0
  242.  
  243. OSBUILD_TIMESTAMP: 2015-11-22 04:24:24
  244.  
  245. BUILDDATESTAMP_STR: 151121-2308
  246.  
  247. BUILDLAB_STR: th2_release
  248.  
  249. BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308
  250.  
  251. ANALYSIS_SESSION_ELAPSED_TIME: 92e
  252.  
  253. ANALYSIS_SOURCE: KM
  254.  
  255. FAILURE_ID_HASH_STRING: km:0x139_3_dxgkrnl!dxgdevice::destroyalldevicestate
  256.  
  257. FAILURE_ID_HASH: {070f1ec5-2412-7644-8cb9-60ac33a7233f}
  258.  
  259. Followup: MachineOwner
  260. ---------
Add Comment
Please, Sign In to add comment